Skip to the content.

CVE-2024-43658

Using the <redacted> action or <redacted>.sh script, arbitrary files and directories can be deleted using directory traversal.

CVE CVE-2024-43658
Title Using the <redacted> action or <redacted>.sh script, arbitrary files and directories can be deleted using directory traversal.
Case DIVD-2024-00035
Credits
Affected products
Product Affected Unaffected Unknown
Iocharger Iocharger firmware for AC models >= 0 to < 25010801 (custom)
everything else
CVSS
Base score 7.2 - HIGH
Attack Vector NETWORK
Attack Complexity> LOW
Attack Requirements NONE
Privileges Required LOW
Confidentiality Impact
Vulnerable system NONE Subsequent systems NONE
Integrity Impact
Vulnerable system HIGH Subsequent systems NONE
Availability Impact
Vulnerable system HIGH Subsequent systems NONE
Safety impact NEGLIGIBLE
Automatable YES
Recovery NOT_DEFINED
Value Density NOT_DEFINED
Vulnerability Response effort NOT_DEFINED
Provider Urgency NOT_DEFINED
References
Problem type(s)
Impact(s) CAPEC-165 File Manipulation
Date published 09 Jan 2025 00:00 UTC
Last modified

Description

Patch traversal, External Control of File Name or Path vulnerability in Iocharger Home allows deletion of arbitrary files
This issue affects Iocharger firmware for AC model before firmware version 25010801.

Likelihood: High, but requires authentication

Impact: Critical – The vulnerability can be used to delete any file on the charging station, severely impacting the integrity of the charging station. Furthermore, the vulnerability could be used to delete binaries required for the functioning of the charging station, severely impacting the availability of the charging station.

CVSS clarification: Any network interface serving the web ui is vulnerable (AV:N) and there are not additional security measures to circumvent (AC:L), nor does the attack require and existing preconditions (AT:N). The attack is authenticated, but the level of authentication does not matter (PR:L), nor is any user interaction required (UI:N). The attack leads compromised of the integrity and availability of the device (VVC:N/VI:H/VA:H), with no effect on subsequent systems (SC:N/SI:N/SA:N). We do not forsee a safety impact (S:N). This attack can be automated (AU:Y).


JSON version.